Headline: 🚨 Critical Alert: The Axios Supply Chain Attack (March 31, 2026) If you are a JavaScript/TypeScript developer, stop what you are doing and check your package-lock.json. Yesterday, one of the most downloaded libraries in the world—Axios (100M+ weekly downloads)—was the victim of a major supply chain compromise. Attributed to the North Korean-nexus group UNC1069, this attack bypasses standard code reviews using a "phantom dependency" technique. 🔴 What happened? A lead maintainer’s npm account was compromised. The attackers published two malicious versions: - axios@1.14.1 (Latest) - axios@0.30.4 (Legacy) These versions look identical to the original code, but they include a new "phantom" dependency called plain-crypto-js. ⚙️ How it works: 1. Silent Execution: When you run npm install, the postinstall script in the malicious dependency automatically triggers. 2. Cross-Platform Malware: It drops a Remote Access Trojan (RAT) tailored for your OS (Windows, macOS, or Linux). 3. Anti-Forensics: The malware is designed to delete its own installation scripts and replace the package.json with a "clean" stub version immediately after infection to hide its tracks from developers. 🛡️ How to resolve and audit: 1. Search your Lockfile: Don't just look in package.json. Search your package-lock.json or yarn.lock for plain-crypto-js or the specific Axios versions above. 2. Check your tree: Run npm ls plain-crypto-js. If it shows up, your environment is likely compromised. 3. Rollback & Pin: Revert to axios@1.14.0 or axios@0.30.3. Avoid using ^ or latest tags for now. 4. Assume Breach: If you found the malicious package, rotate all environment secrets (.env keys, AWS tokens, etc.) and treat that machine as "hot." The npm team has removed the versions, but the window of exposure was roughly 3 hours—enough time to infect thousands of CI/CD pipelines. Stay safe and audit your dependencies today! #CyberSecurity #NodeJS #Javascript #WebDev #AppSec #SupplyChainAttack #Axios
Axios Supply Chain Attack: Check Package-lock.json for Malicious Dependency
More Relevant Posts
-
🚨 The Axios Supply Chain Attack Just Proved: “You Can Be Compromised Without Writing a Single Line of Code.” On March 31, 2026, one of the most trusted npm packages — Axios (100M+ weekly downloads) — was compromised. Not via a typo. Not via a random dependency. But through a hijacked maintainer account. ⚠️ What actually happened: - Malicious versions: axios@1.14.1 & 0.30.4 - Attack window: ~2 hours - Hidden dependency: "plain-crypto-js@4.2.1" - Trigger: simply running "npm install" - Result: Cross-platform Remote Access Trojan (RAT) 👉 Meaning: Your system, CI/CD pipeline, or production environment could be compromised just by installing dependencies. --- 🧠 Why this is scary: - No code changes in Axios itself - No visible red flags in "node_modules" - Malware self-deletes traces - Works across macOS, Windows, Linux - Can execute arbitrary commands remotely --- 🎯 Who was at risk: - Anyone who ran "npm install" during that window - CI/CD pipelines without lockfile enforcement - Projects with auto-updating dependencies --- ✅ What you should do NOW: 1. Check your lockfiles - Look for: "axios@1.14.1" or "0.30.4" 2. Search for malicious package - "plain-crypto-js" 3. If exposed → assume breach - Rotate ALL credentials (API keys, tokens, SSH) - Rebuild systems (don’t just clean) - Audit logs for suspicious activity 4. Prevent future attacks - Use "npm ci" instead of "npm install" - Commit and enforce lockfiles - Consider "--ignore-scripts" in CI - Add dependency security tools (Snyk, etc.) --- 💡 Real Lesson: «Open-source risk is no longer about bad code — it’s about trusted code becoming weaponized.» --- If you're a developer, this is your wake-up call. Security is no longer optional. It’s part of engineering. #CyberSecurity #SupplyChainAttack #JavaScript #NodeJS #DevSecOps #Axios #OpenSource #SoftwareEngineering
To view or add a comment, sign in
-
-
Just saw what happened with Axios last night — this one’s pretty serious. For those who don’t know, Axios is one of the most popular JavaScript HTTP libraries in the world. Millions of developers use it daily — over 100 million downloads per week. Yesterday night (March 31), attackers managed to hijack the npm account of the main maintainer. They published two malicious versions: axios@1.14.1 (tagged as latest) axios@0.30.4 These versions looked completely normal, but they secretly installed a hidden package called ⏩plain-crypto-js. As soon as someone ran npm install, it dropped a cross-platform Remote Access Trojan (RAT) on the developer’s machine — working on Windows, macOS, and Linux. The malware was designed to steal credentials, cloud keys, API tokens, SSH keys, basically anything valuable, and gave the attackers persistent remote access. Thankfully, the malicious versions were only live for about 2–3 hours before security researchers caught it and npm took them down. But in that short window, many developers and CI/CD pipelines got hit. This was a classic supply chain attack — instead of hacking individual companies, they poisoned a popular package that thousands of projects depend on. My honest take: This is scary because it shows how fragile the npm ecosystem still is in 2026. One compromised maintainer account can potentially affect millions of machines in minutes. We’ve seen these attacks increasing, and they’re getting smarter and stealthier. What you should do right now: Check if your projects installed axios@1.14.1 or axios@0.30.4 If yes, treat that machine as compromised Rotate all secrets and keys Rebuild the system if possible Stay safe out there, devs. These supply chain attacks are becoming way too common. What are your thoughts? Have you been using Axios in any of your projects? Did you get affected? #AxiosHacked #NPMAlert #CyberSecurity #SupplyChainAttack #Javascript #InfoSec #NodeJS #WebDev #DevSecOps #MaliciousPackage #OpenSourceSecurity #ThreatIntel #SoftwareSecurity #BreakingTechNews
To view or add a comment, sign in
-
-
🚨 URGENT: Massive Supply Chain Attack on the axios npm package!. If you or your team use JavaScript/Node.js, please read and share this immediately to protect your infrastructure. On March 30-31, 2026, attackers compromised a core maintainer's account and published malicious versions of the axios library: 1.14.1 and 0.30.4. As the most popular JS HTTP client with over 100 million weekly downloads, the potential blast radius of this attack is massive. ⚠️ HOW THE ATTACK WORKS: The compromised versions do not alter the axios code itself; instead, they inject a phantom dependency named plain-crypto-js@4.2.1. The moment you run npm install, a hidden postinstall script silently executes a Remote Access Trojan (RAT) designed for macOS, Windows, and Linux. This malware gives attackers complete control over the infected system, stealing sensitive credentials, API keys, crypto wallets, and cloud tokens. To make matters worse, the malware immediately deletes its source files and swaps its manifest with a clean decoy to evade post-incident detection. 🛡️ IMMEDIATE ACTIONS TO TAKE: 1️⃣ Audit your environments: Check your package-lock.json, yarn.lock, and pnpm-lock.yaml for axios@1.14.1 or axios@0.30.4. You should also look for a plain-crypto-js folder in your node_modules. 2️⃣ Downgrade to safe versions: Pin your dependencies to axios@1.14.0 (for 1.x users) or axios@0.30.3 (for 0.x users). 3️⃣ Assume compromise & rotate keys: If your system or CI/CD pipeline installed the vulnerable versions, treat the machine as fully compromised. Do not attempt to clean the infection in place—rebuild your machines/containers from a known-good state. Rotate all session tokens, API keys, SSH keys, and cloud credentials immediately! Security is a collective effort. Check your repositories today and remind your team to use --ignore-scripts where possible to prevent post-install hooks from running automatically. Stay safe! #CyberSecurity #AppSec #JavaScript #NodeJS #Axios #SupplyChainAttack #Infosec #DevSecOps #OpenSourceSecurity #MalwareAlert
To view or add a comment, sign in
-
-
A major reminder for every developer today: Axios, one of the most widely used JavaScript HTTP clients, was compromised through a supply-chain attack. This was not a vulnerability in Axios code itself. The issue came from a hijacked maintainer npm account, which published malicious versions of the package. The affected releases were axios@1.14.1 and axios@0.30.4. Researchers found that these versions introduced a hidden dependency called plain-crypto-js, which triggered malware during installation through npm lifecycle scripts. That means a normal npm install could silently pull in malicious code. Why this matters: Even trusted open-source packages can become dangerous when the publishing account is compromised. In this case, the attack was designed to hit developers, CI/CD pipelines, and build systems that install the latest package versions automatically. The clean rollback versions are axios@1.14.0 for the 1.x line and axios@0.30.3 for the 0.x line. What should teams do right now? Check lockfiles, dependency trees, and build logs for the affected versions. If either compromised version was installed, treat the machine or pipeline as potentially exposed and rotate secrets, tokens, and credentials. This is a strong reminder that security is not only about writing safe code. It is also about protecting the supply chain, locking versions, reviewing dependency updates, and trusting packages carefully. Elastic Security Labs has the deepest technical breakdown of what happened, including the compromised maintainer account, the malicious dependency, and how the payload behaved across macOS, Windows, and Linux. Read more about it: https://lnkd.in/dgZAdag8 #CyberSecurity #SupplyChainSecurity #Axios #npm #JavaScript #NodeJS #DevSecOps #AppSec #OpenSourceSecurity #SoftwareSecurity #ReactJs #FullStackDeveloper #APIIntergration
To view or add a comment, sign in
-
-
🚨 *Axios JavaScript Library Hit by Critical Supply Chain Attack* 🚨 Axios, a hugely popular JavaScript library with *100 million weekly downloads*, has been compromised in a critical supply chain attack. In a recurring open-source security crisis, developers unknowingly pulled a remote-access trojan from compromised releases. 🔍 *What it means*: This incident highlights the importance of scrutinizing open-source dependencies and ensuring supply chain security in software development. 📚 *Source*: Read more about the Axios npm critical supply chain compromise here credits cybernews: https://lnkd.in/gqw_xJ59 #Cybersecurity #OpenSource #SupplyChainAttack #JavaScript #Axios #DevSecOps #SoftwareDevelopment #CyberNews 🚀
To view or add a comment, sign in
-
-
The recent supply chain attack on Axios highlights exactly how dangerous "dependency hell" has become in the JavaScript ecosystem. We are installing packages based on blind trust. When packages depend on other packages, which depend on even more packages, it becomes nearly impossible to track exactly what is executing on our machines and in our production environments. We often trade security and stability just to save a few lines of code or artificially improve "developer experience"—and this is exactly how we get dragged into this mess. This is a stark reminder that writing your own code for straightforward functions, rather than outsourcing every minor utility to a deep web of third-party libraries, is often the best way to maintain control over your architecture and protect your systems. Read more about the Axios vulnerability here: https://lnkd.in/erv39uAX #JavaScript #WebDevelopment #CyberSecurity #SoftwareEngineering
To view or add a comment, sign in
-
**🔒 The Axios Supply Chain Attack — A Wake-Up Call for Every Developer** On March 31, 2026, Axios — with 83M+ weekly downloads — was compromised in a supply chain attack. Here's what happened: 1. An attacker stole the maintainer's npm access token 2. Published a clean-looking package called `plain-crypto-js` 3. Pushed two poisoned Axios versions (1.14.1 and 0.30.4) that added it as a dependency 4. npm's `postinstall` script silently installed a Remote Access Trojan (RAT) on macOS, Windows, and Linux The scary part? **Not a single line of Axios source code was changed.** Just one extra dependency in `package.json`. And after deploying the RAT, the malware cleaned up after itself — your `node_modules` looked completely normal. The RAT phoned home every 60 seconds and could run shell commands, list files, exfiltrate data, and load additional malware. Elastic Security Labs linked the macOS payload to a **North Korean threat actor** (UNC1069). **What you should do RIGHT NOW:** → Check if you're on axios 1.14.1 or 0.30.4 — downgrade immediately → Remove `plain-crypto-js` from node_modules → Check for RAT artifacts on your machine → If affected: rotate ALL secrets, tokens, and API keys **Lessons learned:** ✅ Pin your dependency versions — don't blindly auto-upgrade ✅ Use lockfiles and review changes to them ✅ Disable postinstall scripts (`npm install --ignore-scripts`) ✅ Use tools like Socket, Snyk, or npm audit ✅ Enable 2FA on your npm account Supply chain attacks don't target your code. They target your trust. Stay vigilant. 📖 For a detailed step-by-step breakdown, check out my full blog post: https://lnkd.in/gmpiGQUv #CyberSecurity #JavaScript #npm #SupplyChainAttack #Axios #InfoSec #DevSecOps #SoftwareSecurity
To view or add a comment, sign in
-
🚨 I installed a package… and it opened a backdoor. Sounds like a movie scene, right? It just happened in real life. On March 30, Axios — a library millions of developers trust — was quietly compromised. No warning. No obvious signs. Just installing certain versions (v1.14.1 / v0.30.4) could: ⚠️ Execute malicious code ⚠️ Drop a Remote Access Trojan (RAT) ⚠️ Connect your system to a hidden C2 server And the scariest part? It cleans up after itself… like nothing ever happened. 💭 Let that sink in: You don’t need to write vulnerable code anymore — You just need to install the wrong package. 🛡️ What I’m doing after this: • Locking dependencies • Auditing packages regularly • Trusting… but verifying Because in 2026, your biggest threat might be inside your package.json. #CyberSecurity #SupplyChainAttack #Axios #NodeJS #Developers #InfoSec #JavaScript #OpenSource
To view or add a comment, sign in
-
-
Axios Supply Chain Attack Shakes npm Ecosystem Trust A recent report highlights a serious supply chain attack involving Axios—one of the most widely used HTTP clients in the JavaScript ecosystem. What happened? Attackers used compromised maintainer credentials to publish malicious versions: * axios@1.14.1 * axios@0.30.4 These versions silently introduced a rogue dependency: `plain-crypto-js@4.2.1`, which executed a post-install script to deploy a Remote Access Trojan (RAT). Why this is critical: * Axios sees ~100M weekly downloads → massive potential impact * The attack targets the install/build phase, not runtime * Secrets (API keys, tokens, SSH keys) could be exfiltrated * Malware cleans up traces → difficult to detect via standard audits Who is affected? Developers or CI/CD pipelines that installed compromised versions Systems where `npm install` executed with scripts enabled Immediate actions to take: Treat affected machines as fully compromised Rotate all secrets (API keys, tokens, credentials) Check for Indicators of Compromise (IOCs): Suspicious temp/system files across macOS, Linux, Windows Lock dependencies and verify package integrity Strengthen supply chain security (e.g., dependency pinning, audit pipelines) #CyberSecurity #SupplyChainAttack #JavaScript #NodeJS #npm #DevSecOps #InfoSec #Axios
To view or add a comment, sign in
-
-
🚨 Axios, most famous JavaScript library got compromised. Compromised versions briefly published: • 1.14.1 • 0.30.4 These malicious releases were live for only a few hours after a maintainer account takeover, but any installs during that window may be impacted. Given Axios’ massive usage (~100M+ weekly downloads), this could still affect a significant number of apps. ⚠️ Dev community: check if your projects pulled these versions during that timeframe. #CyberSecurity #JavaScript #OpenSource #DevCommunity
To view or add a comment, sign in
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development